there are no posts to show...

Helpful Resources


Type “EHR” and “information security” into Google and you will find tons of Internet websites, news articles, and even YouTube videos on touting the various plusses and minuses of electronic health records, or EHR.  In the last few years, the EHR has become the physician’s best friend, as it helps provide better care, better population health and lower heath care costs.  While EHRs might be changing the way hospitals and practice offices operate, there are still issues with using EHRs securely.   According to the HHS Office of Inspector General, nearly “60 percent of hospitals participating in the federal meaningful use incentive program reported an unplanned disruption in their record systems in 2014 and 2015.” [Note that the meaningful use program is a federally backed program designed to encourage adoption of EHRs by doctors and hospitals].  It is also important to note that most of the reported unplanned disruptions were caused by hardware failure, not from cyber attacks.  While hardware failures are a concern, cyberattacks should also be at the top of the list.  Hospitals are facing an increasing number of directed cyberattacks aimed at disrupting and disabling the IT and health record infrastructure.

Having a contingency plan in place to deal with unforeseen events, such as disruptions from hardware failure or loss of patient data because of a cyber attack will ensure that your organization can plan and be ready when the inevitable strikes.  According to the HHS report from July 2016, many of the medical practice organizations investigated, including hospitals and practice offices, followed HIPAA requirements for its contingency plans, including backing up data, having a disaster recovery plan, having an emergency-mode operation plan and testing and revising the contingency plan.  The recent cyberattacks on hospitals have had a profound effect on the security of EHRs.  Earlier this year, a hospital in California fell victim to a ransomware attack that disabled its network and EHR system for a week, which led to delayed patent care and required patients to be moved to other facilities. In March, MedStar Health reported a suspected ransomware attack that required the healthcare network to take its all of its computer systems offline.

During cyber attacks and hardware failures, healthcare organizations rely on backup data in order to return to operations quickly.  Without a contingency plan in place, cyberattacks and outages will cause major headaches for the healthcare provider.  The HIPAA Security Rule requires that covered entities protect and secure the confidentiality, integrity, and availability of electronic protected health information (ePHI), of which EHR is one of many applications that store such data.  Securing this type of data is important as its loss can be a significant financial burden on the healthcare organization.

While the report emphasizes the need for contingency plans, it does not address other areas of security requirements under HIPAA.  HIPAA is required for federal entities, and the HHS Office of Inspector General (OIG) has previously recommended that OCR “fully implement a permanent audit program to assess compliance with HIPAA requirements.”

Whatever your organization’s requirements are, let CyberSheath help you prepare for the unplanned disruption.


CyberSheath Blog

How to Safeguard Your Company from Phishing

Email is so ubiquitous in our everyday lives that it can be a challenge to always be on guard when receiving messages. Each day it’s not unheard of for each member of your team to have hundreds of messages land in their inbox. How do you make sure that none…

3 Tools to Help Defend Your IT Infrastructure from Threats

With the continually evolving threat landscape and the prevalence of team members working from home, it is more important than ever to be proactive with how your company is protecting itself from cyberattacks.  CyberSheath can help. We offer services to build on all the great work you have already done…

DNS Filtering for Additional Protection of IT Systems

Phase one of securing your IT infrastructure should include protecting your endpoints and safeguarding your employees from phishing attempts. After you have implemented these controls, the next logical step is to launch a DNS filtering solution.   What is DNS filtering and why do you need it? Domain name server…

Our Trusted Partners

Tenable Microsoft Siemplify KnowBe4 ConnectWise DUO